Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #18987

Closed (moved)
(moved)
Open
Created May 07, 2016 by Roger Dingledine@arma

Ship a cached-certs file with Tor, to speed first bootstrap

Motivated by #18816 (moved): it looks like in networkstatus_check_consensus_signature() we return success if there are "enough" signature on the consensus we get. So we could cut out the cert fetching step in initial bootstrap for all new Tors, by having an "if there is no cached-cert file, use this string instead" step.

And this string would continue being good enough until quite a few of the authorities have rotated to a new cert.

Minor issue #1: Tor 0.2.7.6 has now been out for five months. I bet quite a few of the certs have rotated by now. So we should keep in mind that this feature in stable releases will decay over time (and maybe we want a new stable every 4-6 months or something anyway). A fancier option would be to use an external file, and then Tor Browser could just make an updated version of the file as part of its release process.

Minor issue #2 (closed): As the stables are decaying, does this feature open the user up to a partitioning attack? I think the answer might be "yes but a very minor one, so let's not worry about it."

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking